Applying ROT13 to a piece of text merely requires examining its alphabetic characters and replacing each one by the letter 13 places further along in the alphabet, wrapping back to the beginning if necessary.A becomes N, B becomes O, and so on up to M, which becomes Z, then the sequence continues at the beginning of the alphabet: N becomes A, O becomes B, and so on to Z, which becomes M.
All you have to do is enter a valid email address and pick a unique username!
Hence without the restriction on a decryption might not be possible.
It can be shown as follows that decryption function is the inverse of the encryption function, Read more ...
Caesar cipher, is one of the simplest and most widely known encryption techniques.
The transformation can be represented by aligning two alphabets, the cipher alphabet is the plain alphabet rotated left or right by some number of positions.